12/22/15

WHITE HOUSE: Congressional Crackdown on Terrorists Attempting to Enter U.S. Will “Violate Iran Deal”

Doug Ross @ Journal
Hat Tip: BB

Just when you thought the Obama administration had maxed out the Insane-o-Meter, it pulls another rabid killer rabbit out of its hat. An incredulous Adam Kredo reports:

Senior Obama administration officials are expressing concern that congressional attempts to tighten laws preventing terrorists from entering the United States could violate the Iran nuclear agreement and prompt Tehran to walk away from the agreement.

Congress is considering measures that would tighten the Visa Waiver Program to make it harder for potential terrorists to legally enter the United States by increasing restrictions on individuals who have travelled to countries with prominent terrorist organizations from bypassing security checks upon entering the United States.Iranian officials have in recent days repeatedly issued threatening statements to the Obama administration, saying that such moves would violate the nuclear agreement, and the Obama administration last week conveyed the Iranian anger to American lawmakers.

 

No, really.

Let me repeat the key graph for slow-witted Democrats (but I repeat myself) reading along (with their lips moving): “Senior Obama administration officials are expressing concern that congressional attempts to tighten laws preventing terrorists from entering the United States could violate the Iran nuclear agreement and prompt Tehran to walk away from the agreement”.

So Iran has executed a series of military provocations that violate U.N. Security Council resolutions,including testing advanced ballistic missiles.

And the Islamic terror state was just caught trying to bring down the U.S. electric grid.

But, according to the Obama-Hillary-Kerry suicide triad, trying to prevent terrorists from entering the United States is the real deal-breaker.

I’ll say it again: the next 12 months can’t happen fast enough.

Hat tip: BadBlue Real-Time News.

10/13/15

The Cyberweapons Club: Easy, Cheap & Available… Spurs New Arms Race

By: Terresa Monroe-Hamilton

Cyberwar

The Wall Street Journal has a great article out on cyber warfare and the weapons it entails. In recent years, countries across the globe have spent billions on facilities that house the means to wage war electronically. You can be a major player on the geopolitical scene even without nuclear weapons. Joining the cyberweapons club is easy, cheap and open to anyone with a computer and money.

Digital warfare was brought to life when numerous countries carried out successful computer raids… the US was one of those countries. Now, a digital arms race is in full swing with countries all over the globe amassing huge troves of malicious code and nasty methods of breaching networks. You’ve got everything from the simplest of programs that use emails that have a single word misspelled, that ask for a password or for you to open an attachment, to more advanced code that utilizes Twitter handles.

In what I consider to be a faux agreement that means about as much as the Iranian deal, the US and China just signed a limited agreement to not conduct various forms of cyber attacks against each other. These have to do with corporate raids and domestic companies. But government espionage is still on the table and fair game. What a joke.

We’ve already seen a great deal of movement in this arena. Take Pakistan and India for example. They are nuclear rivals and hack each other all the time. Estonia and Belarus fear Russia and are working feverishly to build some kind of defense against the Russians. Good luck with that. Denmark, the Netherlands, Argentina and France are all developing offensive computer weapons. Everyone is getting ready for a new frontier on the battlefield.

There are now over 29 nations who have units dedicated to hacking other countries. 50 countries or so have actually purchased canned hacking software that they use for domestic or international surveillance. The US is said to have one of the most advanced operations out there. I’m not so sure of that. I believe that Russia, China, Iran and North Korea all have us beat hands down. As do the Israelis.

Invasive digital attacks are used to mine data and steal information. Computers can be erased at will. Whole networks can be disabled. In one instance, nuclear centrifuges were destroyed. These techniques are used for good and bad reasons. But it’s like Pandora’s box… now that it is out there and growing, nations must not only be defensive, they have to be offensive on this front.

More worrisome attacks are coming our way. Cyberweapons that take down electrical grids, disable domestic airline networks, jam Internet connectivity, erase money from bank accounts and confuse radar systems are being developed. Instances of probing in these areas have already occurred in the US and it is only a matter of time before a major attack comes in these areas. Many of our enemies already have their software on systems throughout the US, quietly lurking until they are triggered for whatever reason. It’s a ticking time bomb.

Our military strategies and tactics will have to change with these new developments if we are to survive. Attacks like these are almost impossible to entirely stop or to trace. To face off against these new threats, we will have to have highly trained units that fight this battle 24 hours a day. Many are already in place and working the issue. I’m just not convinced they will be fast or good enough.

Dozens of countries are now armed to the teeth with cyberweapons. Some Defense Department officials compare the current moment to the lull between the World Wars when militaries realized the potential of armed planes. I believe we are already in World War III and just don’t seem to grasp it yet.

Speaking of war, Syrian hackers have been at it already in that country, looking into the doings of the rebel militias, stealing tactical information and then using that intelligence to attack them. It’s been effective and efficient. With the aid and advice of the Russians, the Syrian government is using high tech as well as on the ground military maneuvers to annihilate their enemies.

As for the US, we know what some countries are up to, but as for many of them, we have no clue. I would say we are in the dark as to a great deal that our enemies have accomplished in the cyber arena. That’s a deadly mistake. In fact, I don’t think anyone, other than the new Axis of Evil (Iran, Russia and China) know exactly how skilled our enemies are in cyber espionage and warfare. You would think that the NSA, CIA and FBI would have a better grasp on all of this, but they don’t.

The new battlefields out there will be comprised of hard military assets, intelligence services and cyber armies. You already see this in the big boys out there: the US, China, Russia, Iran, North Korea and Israel.

The Chinese are masters at hacking. They are infamous for low-tech phishing schemes that trick people into granting them access to their networks. That’s probably how they hacked the Office of Personnel Management. A contractor fell for an innocuous looking email and presto! The Chinese cracked the network and gained access to more than 21 million people’s information. China of course lied. That’s one thing about all these spying nation states… they all lie.

The Chinese army has whole divisions that are devoted to cyber warfare. They believe in unconventional warfare and have been very busy at pushing boundaries abroad. They are very good and very covert. In fact, they even fix what they break on the way in. You never even know they are among you.

China opposes the militarization of cyberspace or a cyber arms race, said Zhu Haiquan, a spokesman for the Chinese Embassy in Washington, adding China “firmly opposes and combats all forms of cyber attacks in accordance with law.” Yeah, well… it depends on what “law” means. And once again, they lie.

On to the Russians… they are very good as well and have just as many units dedicated to cyber warfare as the Chinese. The Russians love to go after diplomatic and political data. They are very good at tailored emails that ensnare their victims. They have dug into the networks at the Pentagon, State Department and White House, also using emails laced with malware, according to security researchers and US officials. The Russian’s have stolen Obama’s daily schedule and his diplomatic correspondence. The Russians say nyet, but of course, they lie.

“Russia has never waged cyber warfare against anyone,” Andrey Akulchev, a spokesman for the Russian Embassy in Washington, said in a written statement Friday. “Russia believes that the cybersphere should be used exclusively for peaceful purposes.” They always deny – lying is second nature to the Russkies.

US spies and security researchers say Russia is particularly adept at developing hacking tools. Some malicious software linked to Russia by security researchers has a feature meant to help it target computers on classified government networks usually not connected to the Internet. They have a virus that literally jumps onto USB thumb drives, just waiting for a user to plug it in on a classified network. It’s ingenious and evil.

Cyberwar1

The Russians are subtle. They will hide stolen data in a whole host of ways. They’ll mix it into normal network traffic. They know just how to fool most cyber security defenses. For instance, they have a piece of malware that hides its communications in consumer web services. The code downloads its instructions from a set of Twitter accounts. It then exports the data to a commercial storage service. Since corporate cyber security systems don’t block traffic to and from these sites, this can be very effective.

But the Iranians go even further. They aren’t content with just stealing information… they use cyberweapons to destroy computers. They’ve done it at least twice. Government investigators believe Iranian hackers implanted the Shamoon virus on computers at Saudi Arabia’s Saudi Aramco, the world’s largest energy firm, in 2012. The Aramco attack erased 75% of the company’s computers and replaced screen images with burning American flags. The attack didn’t affect oil production, but it rattled the company as it gave away the extent of Iran’s cyber capabilities. Ostensibly, the move was in retaliation for the alleged US-Israeli attack on Iran’s centrifuges utilizing the Stuxnet computer worm.

Director of National Intelligence James R. Clapper has said that the Iranians used malware to destroy computers last year at the Las Vegas Sands Corp. The owner, Sheldon Adelson, is a major critic of the Iranian government.

Cyberwar2

The US also contends that Iranian hackers have taken down websites of numerous US banks in DOS attacks. This was in response to a YouTube video on the Prophet Mohammed supposedly. More likely, it had to do with economic sanctions and the Stuxnet attack.

In 2012, Iran announced the creation of the Supreme Council of Cyberspace charged to oversee the defense of Iran’s computer networks and develop “new ways of infiltrating or attacking the computer networks of its enemies.” Since Obama has inked the suicidal nuclear deal with Iran, cyber attacks have slowed somewhat, but that won’t last long. There are no illusions that Iran is in any way an ally to the US. They have aligned with Russia and China to eventually war with us. Tehran appears “fully committed” to using cyber attacks as part of its national strategy.

Let’s peek at the NoKos, shall we? Of course, their latest claim to fame is the Sony hack. It was in retaliation for the movie, “The Interview,” which portrayed their trollish leader in a less-than-favorable light. In it, Kim Jong Un gets offed. No big loss. The retaliatory hack was arguably one of the most successful nation-state breaches ever. Many suspect an inside job since the malware was implanted directly on Sony computers. This allowed the NoKos to steal and destroy data at will. South Korea has also said that the North Koreans have attempted to hack one of their nuclear reactors, as well as a television network and a major bank. The NoKos haven’t denied anything. They don’t care who knows or accuses them.

Looking for work? Defense contractor Northrop Grumman Corp. has advertised for a “cyber operations planner” to “facilitate” offensive computer attacks with the South Korean and US governments, according to a job posting listed online. The scope is undisclosed and probably above all of our pay grades.

I keep hearing the US has the most advanced operations. But as I said before, I highly doubt that. The NSA is touting itself as the “crown creator of cyberespionage.”

In a spectacularly treasonous move, former National Security Agency contractor, Edward Snowden. leaked documents that showed the NSA had implanted malware on tens of thousands of foreign computers. That allowed the US government secret access to data and potentially the industrial control systems behind power plants and pipelines. Color me skeptical, but who knows?

US Cyber Command now has nine “National Mission Teams” with plans to build four more. Each are comprised of 60 military personnel that will “conduct full-spectrum cyberspace operations to provide cyber options to senior policy makers in response to attacks against our nation,” a Pentagon spokesperson said. The Navy, Army, and Air Force will each build four teams, with the Marines building a single unit. Each will have a “separate mission with a specific focus area,” though these have so far remained secret.

In 2014, the Netherlands announced it would begin training its own Internet troops through a domestic cyber security company, called Fox-IT. The head of the Dutch armed forces, Major Gen. Tom Middendorp, said in a symposium the group should be prepared to carry out attacks, not just block them, according to a Dutch media report. The Netherlands’ military strategy, laid out in various documents, refers to hacking as a “force multiplier.”

In 2013, Denmark’s Defense Ministry began allocating about $10 million a year for “computer network operations,” which include “defensive and offensive military operations,” according to government budget documents. That amount is just 0.24% of the Danish defense budget.

There are a lot of software engineers out there producing canned systems for private parties. It’s a seller’s market out there and countries are paying top dollar for cyber warfare software. A document leak on the Italian firm Hacking Team revealed the company had sold its surveillance tools to dozens of countries, including Sudan, Egypt, Ethiopia and Azerbaijan. Money is king and everyone has a price. Our own FBI is evidently a customer of the Hacking Team who promotes their product as “the hacking suite for governmental interception.” It’s the perfect tool for exploiting holes in software to gain access to computers and mobile devices.

States aren’t the only players. About 30 Arabic-fluent hackers in the Palestinian territories, Egypt and Turkey are building their own tools to hit targets in Egypt, Israel and the US, according to researchers.

In August, the US used a drone to kill Islamic State hacker Junaid Hussain in Raqqa, Syria, showing the extent to which digital warfare has upset the balance of power on the modern battlefield. The British citizen had used inexpensive tools to hack more than 1,000 US military personnel and published personal and financial details online for others to exploit. He helped sharpen the terror group’s defenses against Western surveillance and built hacking tools to penetrate computer systems as well.

All this cyber warfare and espionage is making national security and cyberweapons experts very nervous. A really big and debilitating attack could come at any time and we would pretty much be powerless to stop it. We just have no idea what the bad guys are capable of. “What we can do, we can expect done back to us,” said Howard Schmidt, who was the White House’s cyber security coordinator until 2012. The US is thinking, “Yeah, I don’t want to pull that trigger because it’s going to be more than a single shot that goes off.”

The jokes on us… that trigger has already been pulled. Let’s just hope the US isn’t home to the walking dead because of it. Because the cyberweapons club is so easy, cheap and available… we are watching a new arms race take off. The US is not in the forefront of this race and we had better hustle to catch up and overtake our enemies. Cyberspace is the new battlefront.

06/15/15

Obama Administration Incompetence Subjects Millions of Americans to Cyber Hackers

By: Roger Aronoff
Accuracy in Media

Millions of American government employees, former employees, contractors and more have had their most personal and private information breached by hackers, because the government failed to take the necessary steps to protect those records. According to Politico, “Administration officials have said privately that signs point to the first hack having originated in China, and security experts have said it appeared to be part of a Chinese effort to build dossiers on federal employees who might be approached later for espionage purposes.”

It is an outrageous and unacceptable breach of trust. The federal government, through the Office of Personnel Management (OPM), interviews everyone who requires any sort of security clearance, and asks the most detailed and personal questions about past associations, indiscretions and behavior, to make sure nothing in their past could subject them to blackmail or subversion. The interviews extend to friends and associates of those being vetted, and those people are also in the databases that have been breached. But now it has come to light that OPM failed to hold up the Obama administration’s end of the bargain by not doing everything they could to protect those records.

According to David Cox, the national president of the American Federation of Government Employees, in a letter to the OPM director, “We believe that hackers have every affected person’s Social Security number(s), military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance and pension information; age, gender, race, union status, and more. Worst, we believe that Social Security numbers were not encrypted, a cybersecurity failure that is absolutely indefensible and outrageous.”

The Obama administration initially downplayed the cyber hack of the OPM, which centrally manages records for current and former federal employees. It did so even though it had missed the hack for at least four months, if not more, until a company, CyTech Services, which was conducting a sales demonstration, found malware in OPM’s system that could have been there for a year or more. The unfolding series of disasters has affected at least four million Americans—and perhaps as many as 14 million—including all current federal employees, retired federal employees, and a million former federal employees.

Reports of a second hack by China has added to the outrage, and compounded the problems. “Hackers linked to China have gained access to the sensitive background information submitted by intelligence and military personnel for security clearances, U.S. officials said Friday, describing a cyberbreach of federal records dramatically worse than first acknowledged,” reported the Associated Press.

“The forms authorities believed may have been stolen en masse, known as Standard Form 86, require applicants to fill out deeply personal information about mental illnesses, drug and alcohol use, past arrests and bankruptcies. They also require the listing of contacts and relatives, potentially exposing any foreign relatives of U.S. intelligence employees to coercion. Both the applicant’s Social Security number and that of his or her cohabitant is required.”

How many millions of Americans serving their country does this place at risk?

Under a Republican president, this newest administration scandal would have been front-page, round-the-clock news, with the most sinister of motives ascribed to them, probably for many days running. But as of Friday morning, The Washington Post had relegated coverage of this story to page A14, and several other news outlets began covering the story by simply reposting an AP article to their own websites. Television news has been dominated by stories of two escaped convicts, a local head of the NAACP who falsely represented herself as African American, and the reset, or re-launch, of Hillary Clinton’s presidential campaign.

Where are the talking heads, the pundits in the media, calling for President Obama—not agencies, not government bureaucrats, but President Obama—to show more care in protecting American citizens against cyberattacks? Such attacks violate our privacy and leave each of us open to hacking, blackmail, and targeting by China, which has been connected in most reports to the breaches. And it serves as a reminder how likely it is that Hillary Clinton’s private email server that she used during her tenure as Secretary of State was hacked by the Chinese, and possibly the Russians, North Koreans and Iranians. One can only imagine what they have on her.

“What’s more, in initial media stories about the breach, the Department of Homeland Security had touted the government’s EINSTEIN detection program, suggesting it was responsible for uncovering the hack,” reports Wired.com. “Nope, also wrong.”

“The OPM had no IT security staff until 2013, and it showed,” reports Wired.

Ken Dilanian’s AP article, despite its wide distribution, fails to mention the number of warnings that OPM, and the government as a whole, has received about its lack of adequate security. “U.S. Was Warned of System Open to Cyberattacks,” reported The New York Times on June 5, describing OPM’s 2014 security as “a Chinese hacker’s dream.”

The 2014 Inspector General’s report was based on an analysis conducted between April and September of last year. While the administration has said that the attack occurred in December of last year, The Wall Street Journal’s Damian Paletta and Siobhan Hughes wrote of the first reported attack: “Investigators believe the hackers had been in the network for a year or more” when it was discovered in April.

That IG report stated that OPM’s status was “upgraded to a significant deficiency” due to a planned reorganization, and that it had “material weakness in the internal control structure” of its IT program.

“The agency did not possess an inventory of all the computer servers and devices with access to its networks, and did not require anyone gaining access to information from the outside to use the kind of basic authentication techniques that most Americans use for online banking,” reported the Times. “It did not regularly scan for vulnerabilities in the system, and found that 11 of the 47 computer systems that were supposed to be certified as safe for use last year were not ‘operating with a valid authorization.’”

Neither the AP nor the Times noted that this situation reaches as far back as at least fiscal year 2007, with the 2013 IG report indicating that there was a “lack of IT security policies and procedures.” This worsened in fiscal year 2009, with some corrections in 2012, but as of fiscal year 2013 instituted reforms had “only been partially implemented.”

Clearly, this failure has been growing on President Obama’s watch.

The Times noted that “upgrades were underway” when the first reported attack happened, and cited an unnamed former Obama administration official as saying, “The mystery is what took the Chinese so long.”

When asked about the IG reports, White House press secretary Josh Earnest insisted on setting the cited reports aside, because “there is risk associated” with using any computer network. The U.S. government has been raising that risk by not securing its own networks.

One might question whether American citizens are any safer today, and if the Obama administration has made the necessary reforms following these attacks. Earnest, the White House press secretary, used vague language to describe security upgrades after the first cyber intrusion was reported. He cited “ongoing efforts” to “update our defenses and update our ability to detect intrusions” and blamed Congressional inaction.

“And the fact is, we need the United States Congress to come out of the Dark Ages and actually join us here in the 21st century to make sure that we have the kinds of defenses that are necessary to protect a modern computer system,” he said. “And we have not seen that kind of action in Congress.”

While cooperation with the private sector may help upgrade government information technology systems, it is the responsibility of the administration and the media to hold President Obama accountable for this debacle, which has been brewing over the course of his entire term in office. There should be a complete investigation, whether by Congress or an independent counsel, into the failure of the Obama administration to protect the privacy and personal information of millions of Americans. What did they know, when did they know it, and who or what is to blame? What can be done to ensure this doesn’t happen again? People should be held accountable.

“If OPM is behind on cybersecurity, which it is, it has plenty of company,” reported the Post on June 7. Almost all, 23 of 24, major agencies cited these security issues as a “major management challenge for their agency,” it reported. The GAO indicated last year that the number of breaches involving personally identifiable information has more than doubled between 2009 and 2013, according to the Post.

With the mainstream media intent on championing all the benefits of Obamacare amidst an upcoming Supreme Court decision over subsidies, coverage of the security deficits within the health care exchanges has virtually disappeared. “Independent agencies such as the Government Accountability Office and the HHS inspector general have warned of continued security problems,” wrote Rep. Diane Black (R-TN) for The Wall Street Journal last November. “This is concerning for Americans, as HealthCare.gov houses vast amounts of sensitive personal enrollment information—from full, legal names, to Social Security numbers, dates of birth and even income information.” She notes that Healthcare.gov has been “described by experts as a ‘hacker’s dream.’”

Just like OPM. How soon will we hear that the millions on the Obamacare exchanges have also had their personal information compromised by foreign hackers, and will the mainstream media also then blame that future disaster on a bureaucrat, and not Obama?

Our nation also remains vulnerable to an electromagnetic pulse attack, which could involve exploding a nuclear weapon at high altitude in the atmosphere. With Iran seeking nuclear capability, this becomes even more of a threat.

A report by the Department of Homeland Security indicates “that a massive electromagnetic pulse event caused by a solar flare could leave more than 130 million Americans without power for years,” reported WorldNetDaily last December.

“President Obama could sign an executive order mandating [that] DHS add EMP to its emergency planning, but he has not done so, even though he reportedly is aware of the consequences.”

When are the mainstream media going to hold President Obama accountable for the many scandals, and bungling incompetence, plaguing his administration? Our veterans are at risk because of scandals and incompetence at the VA, and our flying public because of scandals and political correctness at the FAA and TSA. Obama’s security policies are jeopardizing the safety and welfare of millions of Americans. If the Chinese government is really behind these attacks, which is still being investigated, do we plan to retaliate in any way? Or is there no price to pay? The mainstream media, once again, appear to be more interested in preserving their access to the halls of power, and in avoiding at all costs attributing any of the blame for this catastrophe to the Obama administration’s ineptitude and incompetence.

05/3/15

The Continuity of Government – The Mystery of Peters Mountain

By: Terresa Monroe-Hamilton
Hat Tip: Trapper Pettit

A friend sent me an article from Zero Hedge that I find intriguing and it raises far more questions than answers.

I did not know that there was something called a PreparAthon held by FEMA on April 30th. Did you? Supposedly the nationwide drills are for – get this – the catastrophic consequences of global warming. Right. Sure it is. I suspect that propagandic line is for the rubes, when in fact what the feds fear the most is an EMP attack or a massive cyber attack. DHS was just all abuzz over this drill evidently.

But what caught my attention, was the movement and inclusion of activities around a real underground bunker north of Charlottesville, Virginia on Peters Mountain. This not-so-secret bunker may just be the hidey-hole for feds and our nation’s intelligence operations when the Schumer hits the fan. It is the perfect bunker to protect those elitists and power mongers that matter, while everyday America devolves into barbarity and the die-off begins.

Meanwhile, FEMA and DHS held their PreparAthon aimed at severe weather events due to climate change. Talk about a massive waste of money… unless of course those exercises provide cover for drills for threats of a much more serious and dire nature. Preparations for continuity of government and all that entails once the barbarians breach our gates for real.

Would it surprise anyone that the government was stocking their bunkers and preparing for the worst? With nationwide riots, escalating nuclear threats, imminent global war, ISIS terrorist cells planted in every state, the growing threat of crippling cyber attacks and the all too real EMP catastrophe looming, it’s a virtual certainty that the government is preparing to save their own and ensure that they can continue to rule the roost even if the roost is devastated.

These massive preparations include our intelligence agencies – can’t go on existing without spies, now can we? I first learned of Peters Mountain from author and friend, Trapper Pettit and his fantastic book The Osprey Vendetta. Hugely entertaining, but aside from a great read, Peters Mountain was woven into the storyline in that series of books as well.

For the very first time this year, the Office of the Director of National Intelligence made public that it would partake in the PreparAthon employing something vaguely named the National Intelligence Emergency Management Activity (NIEMA). The Director of National Intelligence merely describes NIEMA as providing “the framework, platforms, and systems to enable the Director of National Intelligence to lead an integrated and resilient [intelligence community] enterprise capable of sustaining the ‘intelligence cycle’ under any crisis or consequence management event, both at our headquarters and at our alternate operating locations.” Peters Mountain anyone? I highly doubt the DNI is shaking in his spiffy boots over climate change – but there is a whole host of real threats overshadowing the US that make preparation and fortification of utmost importance to spooks.

From Zero Hedge:

But job descriptions, contracting documents, insider resumes, and furtive discussions with Washington sources reveal that this little-known “activity” is a $100-million-a-year disaster playpen. At its 24/7/365 Response Operations Center (at a classified location), watch officers provide what’s referred to as “situational awareness and crisis support” to the nation’s leaders; and when that fails, they evacuate to their classified alternate facility, which sources say is in Albemarle County in central Virginia.

There is really only one candidate—a mysterious facility atop Peters Mountain, roughly 16 miles east of Charlottesville—and it’s undergone a $61 million plus renovation since 2007.

What follows are some intriguing photos of Peters Mountain. This is property owned by AT&T, but it is government land. Oh, so many questions there… Not only has AT&T leaked our private conversations and information to the government, they are fully in bed with them as this would seem to most certainly attest to. On top of the mountain, on a helicopter pad, is the AT&T logo for the world and Google to see.

The plot of land is strangely listed as “vacant residential land” of no value. However, it does belong to AT&T. Land with no value that has had 10’s of millions of dollars of improvements over the last several years. Hmmmm.

Zero Hedge points out that the building permits submitted since 2007 amount to $61,124,583.00 for interior and exterior alterations, including the building of the helicopter pad, a new bunker entrance, “alteration to interior spaces” and installation of two new satellite dishes.

I would say it is safe to assume that this property is something ‘other’ than residential and houses something deep inside. Why else would you need a bunker entrance? There are also a number of other buildings on the property along with a rather large parking lot. Just what is AT&T and the government up to?

Google and Bing each have satellite views of the mountain top, showing the same structures and the progress of construction since 2007. And I find these pictures just fascinating. On the right hand side you can see the parking lot and the bunker entrance. The two large building like structures could be air purification installments and ventilation. Just a guess. The structure must be buried deep within the mountain to protect from bombing etc. Dirt is an excellent protector. Although it doesn’t sport an outwardly military appearance, it reeks of it.

The two large structures on top of the mountain, to the left of the helicopter pad, are assumed to be vent stacks and hardened power and communications antennae. Two satellite dishes added after 9/11 are also now apparent, suggesting autonomous and enduring communications. Starting to get that ‘military’ feel yet?

Consider the Mormon’s Granite Mountain Vault for document storage and how massive that is. You might also want to consider Perpetual Storage Inc.’s vault in Utah as well, which houses computer equipment, digital records, etc. Neither of these are set up as actual living bunkers. The scale inside Peters Mountain must be massive to provide for human living, food storage and growth, waste elimination, supplies of water and electricity, computer processing, medical provisions, defense provisions, etc. for hundreds, if not thousands, of people

There is nothing that refers to NIEMA, the DNI or the intelligence community on record in that county. But of all the places that could hold hardened fortification, Peters Mountain more than fits the bill. Sources, according to Zero Hedge and Gawker, describe the national Warning, Alert and Mobilization System (WAMS) which would alert a select group of civilian executives from across the intelligence community to deploy to the bunker. The alert would come from “The Communicator” Automated Notification System and would take two forms: alerts for everyone and alerts for the “core” participants. Because Washington is notorious for traffic congestion, those so-called core participants, those who have to move away from Washington within minutes of notification, would congregate and board helicopters which would take them to the bunker.

Gawker even sent a driver to go up the road on the mountain. But when he encountered a “Road Closed – No Trespassing – Private Property” sign, he decided he would go no further. I guess he didn’t want to be shot or arrested.

It appears to me that exercises at this bunker occur frequently and that along with Mount Weather, Raven Rock and the Olney bunkers, it’s stocked, primed and ready at a moment’s notice for those who would be fortunate enough to be invited in should the very worst happen.

Yep, I know this is the stuff of conspiracy theories… but ask yourself, with everything that is happening in America, do you honestly believe our government isn’t providing an escape plan for our so-called select leaders? Peters Mountain raises far more questions with me than answers. But the aerial footage is pretty self-explanatory to an extent and even their work permits specified a ‘bunker entrance.’ It doesn’t get much more obvious than that.

I’m sure I’m not the only one who has looked around and has noticed the government buying up food and weaponry, as well as supplies, etc. I keep wondering why the hurry? Do they know something we don’t? Why is the Fed fortifying its building in Chicago? And the kicker… NORAD just returned to Cheyenne Mountain. In a refreshing twist, NORAD comes right out and says it is because of the EMP threat.

From NewsMax:

“Why the return?” write Henry F. Cooper and Peter Vincent Pry. “Because the enormous bunker in the hollowed-out mountain, built to survive a Cold War-era nuclear conflict, can also resist an electromagnetic-pulse attack, or EMP.”

While the Pentagon is moving to shield its global air defense command from being knocked out by an electromagnetic pulse (EMP) attack, the Obama administration has failed to act on urgent recommendations to protect the country’s civilian electronic infrastructure from a similar catastrophe, they write.

“An EMP strike, most likely from the detonation of a nuclear weapon in space, would destroy unprotected military and civilian electronics nationwide, blacking out the electric grid and other critical infrastructure for months or years,” Cooper and Pry write.

“The staggering human cost of such a catastrophic attack is not difficult to imagine.”

The likeliest source of such an attack would be North Korea or Iran, according to Cooper, former director of the Strategic Defense Initiative, launched by the late President Ronald Reagan, and Pry, executive director of the EMP Task Force on National and Homeland Security and a veteran of the Central Intelligence Agency.

Iran is a nuclear-ready state with ballistic missiles capable of striking the United States now, Cooper, Pry and and two other Reagan administration alumni wrote in an op-ed for Newsmax in February.

In the Journal, Cooper and Pry reiterate that “Iran should be regarded as already having nuclear missiles capable of making an EMP attack against the U.S.,” noting, “Iran and North Korea have successfully orbited satellites on South-Polar trajectories that appear to practice evading U.S. missile defenses, and at optimum altitudes to make a surprise EMP attack.”

So, consider this… if the military fears an EMP from Iran (or Russia or China) and is prepping like hell for it, why is our President striking deals with them? That’s treasonous in my book. These same leaders who make fun of bloggers warning on the power grid and its vulnerabilities and preppers who preach preparedness, are the same leaders who won’t harden the electric grid and take it off the Internet where it is vulnerable, while prepping bunkers where they can run to when it all goes south. Sounds to me as if the elitists are all for the continuity of government and the fall of America… right into the clutches of a global government construct.

04/16/15

ISIS In Mexico, Means ISIS Is Here In The United States

By: Terresa Monroe-Hamilton


Bare Naked Islam


The 9.12 Project

Thanks to Judicial Watch, we now know that eight miles across the Texas border into Mexico, lies an ISIS camp. It’s merely a stone’s throw from El Paso. A second one is on the Mexican side of the border from New Mexico. If those two are confirmed, there are probably others. This intel comes from a Mexican Army field grade officer and a Mexican Federal Police Inspector – long time, trusted sources of Judicial Watch.

The area where the ISIS cell lies across from El Paso is known as “Anapra.” It is just west of Ciudad Juárez in the Mexican state of Chihuahua. The other cell is to the west of Ciudad Juarez in Puerto Palomas. They are targeting New Mexico – specifically the towns of Columbus and Deming as entry points into the US with the aid of Mexican cartels.

But just coming to America is not the main course here. Mexican Army and federal law enforcement officials also discovered documents in Arabic and Urdu supposedly in or near these camps, as well as documented “plans” of Fort Bliss – the sprawling military installation that houses the US Army’s 1st Armored Division. Muslim prayer rugs were recovered with the documents during a joint operation last week.

Both law enforcement and intelligence sources are reporting that the area surrounding Anapra is controlled by the Vicente Carrillo Fuentes Cartel (“Juárez Cartel”), La Línea (the enforcement arm of the cartel) and the Barrio Azteca (a gang originally formed in the jails of El Paso). This makes this area extremely violent and dangerous for the Mexican Army and the Federales to operate in. The cartel love to torture and kill police and military personnel that they cannot turn into agents for the cartels.

Judicial Watch’s sources say that “coyotes,” who are into human smuggling/white slavery and are working for the Juarez Cartel, are also in league with ISIS. They help transport them through the desert and across the border between Santa Teresa and Sunland Park, New Mexico. To the east of El Paso and Ciudad Juárez, cartel-backed “coyotes” are also smuggling ISIS terrorists through the porous border between Acala and Fort Hancock, Texas. Since no one is there watching the border, these areas are more easily accessible. This whole area is a haven for large scale drug smuggling operations through numerous routes as well.

It is now known that ISIS intends to target railways and airport facilities in the vicinity of Santa Teresa, NM (a US port-of-entry). ISIS also has “spotters” located in the East Potrillo Mountains of New Mexico (largely managed by the Bureau of Land Management) to assist with terrorist border crossing operations. They are conducting reconnaissance of universities, the White Sands Missile Range, government facilities in Alamogordo, NM and Ft. Bliss, as well as the electrical power facilities near Anapra and Chaparral, NM. That ought to have Americans screaming, but no one seems to be noticing it much at all. That is apathetically suicidal. ISIS doesn’t tend to bluff and they have already told us they are coming.

Remember, this is the border that Obama refuses to secure. The border he has thrown open to welcome illegal immigrants. Those illegals coming over that border in the last year and a half, are primarily not Mexican. Many of them are other nationalities. It’s a welcome wagon for ISIS and other terrorists.

Ft. Bliss is aware of the ISIS threat that is near them and has them in their sights. The police and Feds also know, but none of them have the green light or the wherewithal to do anything about it. In fact, the Feds are denying this whole issue even as the evidence mounts that the terrorists are here and casing the joint. Terrorists have already been caught coming across the Mexican border into Texas over the last few months. For The Record documented the fact that a Russian operative came across, was caught and then released. It would appear we have no protection from our enemies whatsoever and sooner than later, there will be a major attack on America over that border courtesy of Barack Obama and his Administration.

In September of 2014, Francis Taylor, the undersecretary for intelligence and analysis at the Department of Homeland Security (DHS), testified that there “have been Twitter and social media exchanges” involving ISIS adherents across the globe discussing the idea of infiltrating the United States through its southern border. So, this development comes as absolutely no surprise.

WND reported that it was about that time that Rep. Duncan Hunter, R-CA, confirmed in a TV interview that jihadists with the Middle Eastern group ISIS were caught coming into the US from Mexico. He got that directly from the Border Patrol.

“They were caught at the border … therefore, we know that ISIS is coming across the border,” he said. “If they catch five or 10 of them, we know there are dozens more that did not get caught.”

Of course, Homeland Security Secretary Jeh Johnson denied the reports at the time. And surprise, surprise, surprise… now the FBI is denying that ISIS is only eight miles from El Paso as well. Responding to Judicial Watche’s claims, the FBI called a “special” meeting at the US Consulate in Ciudad Juárez.

From Judicial Watch:

A high-level intelligence source, who must remain anonymous for safety reasons, confirmed that the meeting was convened specifically to address a press strategy to deny Judicial Watch’s accurate reporting and identify who is providing information to JW. FBI supervisory personnel met with Mexican Army officers and Mexican Federal Police officials, according to JW’s intelligence source. The FBI liaison officers regularly assigned to Mexico were not present at the meeting and conspicuously absent were representatives from the Department of Homeland Security (DHS). It’s not clear why DHS did not participate.

[…]

Last August JW reported that ISIS, operating from Ciudad Juárez, was planning to attack the United States with car bombs or other vehicle borne improvised explosive devices (VBIED). High-level U.S. federal law enforcement, intelligence and other sources confirmed then that a warning bulletin for an imminent terrorist attack on the border had been issued. Agents across a number of Homeland Security, Justice and Defense agencies were placed on alert and instructed to aggressively work all possible leads and sources concerning the imminent terrorist threat.

Just last week, ISIS released a video promising “We Will Burn America.” It calls for another 9/11 in America and for ISIS fighters to slaughter Americans across the globe. Don’t you think that it would be prudent to listen when someone with a proven murderous track record threatens to annihilate millions of Americans? Hmm?


The Clarion Project

The film was distributed with a twitter campaign using #WeWillBurnUSAgain and #We_Will_Burn_America, alongside pictures showing the imagined destruction.


The Clarion Project

Erick Stakelbeck points out there are three ways ISIS can attack and kill us here at home:

“City Wolves”

In February of this year, FBI Director James Comey made a stunning statement about ISIS supporters in the United States: “Those people exist in every state,” Comey said. “I have homegrown violent extremist investigations in every single state. Until a few weeks ago there was 49 states. Alaska had none which I couldn’t quite figure out.” He added, “But Alaska has now joined the group so we have investigations of people in various stages of radicalizing in all 50 states.”

So, now we know that there is a network of ISIS supporters and sympathizers in every state of the union. The enemy has infiltrated all 50 states and they are biding their time. ISIS is nothing if not patient.

ISIS calls these homegrown jihadists “city wolves” and is actively encouraging them to carry out one-man (or one-woman) jihads in US cities wherever they can and whenever they get the opportunity. You’ve already begun to see some instances of attacks across the nation. For instance, a Columbus, OH man whom the Department of Justice says trained with ISIS in Syria and was planning a terror attack here has been arrested in the US. It will get much worse, I have no doubt. As Stakelbeck put it, if ISIS supporters begin to carry out smaller scale, horrific attacks like this on a regular basis in American cities, creating a virtual guerrilla war-type climate, the US economy and psyche could be affected in profound ways. Not to mention it would give Obama a perfect excuse to declare martial law or solidify his national police force or both.

The Returnees

Department of Homeland Security Chief Jeh Johnson recently admitted that at least 40 of the estimated 180 US citizens who have traveled overseas to fight alongside ISIS have already returned home. “We have in fact kept close tabs on those who we believe have left and those who’ve come back,” Johnson told 60 Minutes. “A number have been arrested or investigated and we have systems in place to track these individuals. But you can’t know everything.”

Really? Because I thought it was your job to know everything. At least when it comes to terrorists. That’s Johnson telling Americans it’s only a matter of time till we get hit – that the terrorists are slipping through the cracks and there’s nothing we can do about it. Meanwhile, close to 5,000 Europeans have left to join ISIS. Western Europeans can enter the United States without a visa. These people don’t have a flipping clue how many are coming or are already here. That’s frightening.

The Border

This brings us full circle back to Judicial Watch’s warning and the border. Think about ISIS getting chemical or biological weapons across our border. Think the unthinkable – what if they brought nuclear weapons across. It wouldn’t be hard with no one guarding the hen house, now would it? Consider those weapons nestled away across America and ISIS simultaneously attacking a number of our larger cities all at once. It would be a killing field and our worst nightmare.

9/11 happened almost 14 years ago and yet our borders are so ridiculously unsecured that there might as well be neon signs flashing that say “Jihadists Welcome” upon entrance into the US from Mexico and Canada. Yet, our leaders claim they have never been more secure. A nation-state cannot sustain itself long term – or protect its citizens – if it refuses to secure its borders. If your borders are not protected, you have no sovereignty and won’t stand as a nation for long.

ISIS in Mexico, means ISIS is here in the United States. It’s a no-brainer. Yet we aren’t going after the cartels, smoking out the spotters, chasing down known terrorists or doing anything that even remotely looks like protecting the US from ISIS launching a terrorist attack. The enemy is already through our gates and setting up house here in the US. The Islamic State is getting ready for a killer performance. Where do we go from here indeed… we don’t even realize we are at war in our own country.